Dear YouTubers, phishers are after your accounts
This phishing campaign is so convincing that even savvy YouTubers may be duped into giving crooks control of their accounts.
57 articles
This phishing campaign is so convincing that even savvy YouTubers may be duped into giving crooks control of their accounts.
Crooks hacked telecom protocol SS7 to steal banking two-factor authentication codes.
Changing passwords regularly is outdated. Use strong and unique passwords that are easy to remember instead. Here’s how to make them.
Designer Mark used the same password for all of his accounts — and lived to regret it. Here’s his story.
Why SMS isn’t the best choice for two-factor authentication, and what alternative types of 2FA you should consider.
Speaking of two-factor authentication — as we often do — did you know some convenient settings render it utterly useless? Let’s do it right.
When it comes to online accounts, voicemail is a major security hole. Here’s why.
How to protect the financial accounts of your clients without scaring them away.
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss a vulnerability in Sonic the Hedgehog, a woman who has a habit of sneaking onto flights and more.
In this week’s Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff look at cryptokittens, password pains, 2-factor authentication earrings and much more.
This week’s Transatlantic Cable podcast dishes on a hacked plastic surgeon, unsafe dating apps, new forms of 2FA, and more.
Experience shows that even Internet old-timers fail to protect themselves from targeted hacking. As our everyday life is becoming more and more connected to the Internet and other networks, online
Remember last year’s well-publicized leak, which exposed some celebrities’ nude photos? The story not only made some individuals’ day (and probably night), it turned to be a very educating precedent. For
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?